PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

12
A summary of types of attacks II.

Transcript of PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

Page 1: PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

A summary of types of attacks II.

Page 2: PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

Page 2

Instructor, PACE-IT Program – Edmonds Community College

Areas of Expertise Industry Certifications PC Hardware Network

Administration IT Project

Management

Network Design User Training IT Troubleshooting

Qualifications Summary

Education M.B.A., IT Management, Western Governor’s University B.S., IT Security, Western Governor’s University

Entrepreneur, executive leader, and proven manger with 10+ years of experience turning complex issues into efficient and effective solutions. Strengths include developing and mentoring diverse workforces, improving processes, analyzing business needs and creating the solutions required— with a focus on technology.

Brian K. Ferrill, M.B.A.

Page 3: PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

Page 3

A summary of types of attacks II.

– Sniffer and password attacks.

– Social engineering attacks.

PACE-IT.

Page 4: PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

Page 4

Sniffer and password attacks.A summary of types of attacks II.

Page 5: PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

Page 5

Sniffer and password attacks.

Quite often, an attacker (hacker) will use a sniffer type attack in order to determine what type of attack to use on a network.

Sniffer attacks use specialized software to examine the network for vulnerabilities. That software may conduct a port scan—looking for either open or vulnerable ports that can be exploited. Or, the software may be used to examine network packets in order to determine what applications, protocols, and services are in use on the network.A common port scanning attack is the XMAS scan. With the XMAS scan, each packet sent by the scanner has three of the six possible flags set (so it is lit up like a Christmas tree) in order to keep the scan from being discovered.

A summary of types of attacks II.

Page 6: PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

Page 6

Sniffer and password attacks.

Unfortunately, end user passwords often present an attacker with an easy entry into the network.

Even when network administers try to create a strong password policy, end users often attempt to create easy to remember passwords. Usually, if the password is easy to remember, it is easy to crack.In studies conducted on passwords, some of the most common include: 12345678, password, qwerty and letmein. These do not represent much of a challenge to the hacker. Attackers also have other tools that they can use in a password attack.

A summary of types of attacks II.

Page 7: PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

Page 7

Sniffer and password attacks.

– Types of password attacks.» Dictionary attack: the attacker uses a

specialized software that contains a list of the most popular usernames and a list of all of the words in a language.

• The program runs through all of the possible combinations in an attempt to find one that works.

» Brute force attack: an attacker uses a password cracking application that mathematically calculates every possible password combination.

• Takes a large amount of computing power and time in order to be successful.

• A rainbow table may speed up the process. It contains a list of all of the possible characters and combinations that can be used to create a password.

» Hybrid attack: uses a combination of the dictionary attack and the brute force attack.

» Birthday attack: an attempt to duplicate a hashed value that is used to authenticate a user or system.

• The attacker uses a program that hashes data in an effort to recreate a known hashed value; if enough data is input, eventually the hashed value will be duplicated.

A summary of types of attacks II.

Page 8: PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

Page 8

Social engineering attacks.A summary of types of attacks II.

Page 9: PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

Page 9

Social engineering attacks.

– Phishing attack.» The hacker typically casts out a broad net of emails

that appear to be from a trusted source (e.g., a well known bank or Google) that requests that the user click on a hyperlink.

• The hyperlink connects to a malicious website and, when the user inputs his or her credentials (as requested), the attacker then steals the user’s credentials.

» Spear phishing attacks are similar to phishing attacks, but more directed.

• The hacker’s email appears to come from an even more trusted source (e.g., from management or a trusted coworker).

– Pharming attack.» The attacker uses DNS poisoning to redirect traffic from

legitimate sites to a different or malicious site.

– Vishing.» Using the telephone to perform a phishing attack.

• The attacker impersonates a trusted source (or attempts to impersonate a trusted source).

A summary of types of attacks II.

Page 10: PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

Page 10

What was covered.A summary of types of attacks II.

Hackers will often use a sniffer type attack when attempting to determine what other type of attack will work against a network. Sniffer attacks can scan networks for open ports and vulnerabilities. A common port scanning attack is the XMAS scan. Passwords often represent a vulnerability to network security. Hackers may use dictionary, brute force, or hybrid attacks in an attempt to crack passwords. Birthday attacks attempt to duplicate a hashed value that is used for authentication.

Topic

Sniffer and password attacks.

Summary

Over the years, social engineering attacks have proven to be a successful avenue for hackers to use. Some of the methods used for social engineering attacks include: phishing, spear phishing, pharming, and vishing.

Social engineering attacks.

Page 11: PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

Page 11

Page 12: PACE-IT, Security+3.2: Summary of Types of Attacks (part 2)

This workforce solution was 100 percent funded by a $3 million grant awarded by the U.S. Department of Labor's Employment and Training Administration. The solution was created by the grantee and does not necessarily reflect the official position of the U.S. Department of Labor. The Department of Labor makes no guarantees, warranties, or assurances of any kind, express or implied, with respect to such information, including any information on linked sites and including, but not limited to, accuracy of the information or its completeness, timeliness, usefulness, adequacy, continued availability or ownership. Funded by the Department of Labor, Employment and Training Administration, Grant #TC-23745-12-60-A-53.PACE-IT is an equal opportunity employer/program and auxiliary aids and services are available upon request to individuals with disabilities. For those that are hearing impaired, a video phone is available at the Services for Students with Disabilities (SSD) office in Mountlake Terrace Hall 159. Check www.edcc.edu/ssd for office hours. Call 425.354.3113 on a video phone for more information about the PACE-IT program. For any additional special accommodations needed, call the SSD office at 425.640.1814. Edmonds Community College does not discriminate on the basis of race; color; religion; national origin; sex; disability; sexual orientation; age; citizenship, marital, or veteran status; or genetic information in its programs and activities.